Feeds

You want a medal for writing a script? Sure: here it is!

Developer explains how Perl and Excel code earned him the US Army Commendation Medal

The Power of One Brief: Top reasons to choose HP BladeSystem

Software engineer and Arizon Army National Guard member Vivin Paliath has explained how writing some Perl and Excel macros saw him decorated with the Army Commendation Medal, a decoration awarded “to any member of the Armed Forces who distinguishes himself or herself by heroism, meritorious achievement, or meritorious service.”

Paliath served a tour of duty in Iraq during 2005 and 2006 in a unit that operated lots of vehicles. As he explains in a post about his experiences, “My job was to order parts for mechanics, pick them up, return old parts, manage HAZMAT, dispatch/return vehicles from missions, and handle licenses.”

During pre-tour training, Paliath was introduced to the application he'd be required to use, called “ULLS-G (Unit Level Logistics System – Ground)".

The software ran in in DOS, did not offer a point-and-click interface and offered no batch processing. The last omission was galling, because it made for lots of tedious work.

“Let’s say you had to print out [driving] licenses for soldiers in your unit,” Paliath writes. “You had to go through and print out each license one by one. You’d go to a screen to load up a user’s license by entering their license number, and then you had to print it. Our unit had around 150 soldiers, so to print everyone’s licenses, I had to individually look up each soldier and then print his license.”

By happy accident, Paliath says “I stumbled across a page where someone had posted an ODBC driver for ULLS-G. This meant that I could run SQL queries against the ULLS-G data files.”

“Armed with this, I started writing Perl scripts to query the data. By the time we had reached Iraq, I had a working script that generated licenses as text files for all the soldiers. The script only took a second or two to run, and the longest part of the process was simply printing out the licenses.”

Another of Paliath's regular tasks was creating daily reports describing the condition of his unit's vehicles. Manual data entry to an Excel spreadsheets was the order of the day until he figure out that Excel was comfortable importing data from ODBC-enabled sources. One Macro later and daily reports were populated in moments.

Paliath writes that he was not supposed to undertake this work for security reasons, but that once his superiors appreciated the productivity improvements he had enabled they turned a blind eye.

His staff sergeant also noticed his work because, at the end of his tour, the certificate accompanying his Army Commendation Medal specifically mentioned his khaki coding efforts.

Paliath writes he was surprised to receive the commendation because he hardly ever went off base, and therefore worked in relative safety. “Although I didn’t work on any of it for recognition, it’s still a good feeling when you find out that your work is appreciated,” he says. ®

Securing Web Applications Made Simple and Scalable

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.